Дата обнаружения
|
03/08/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, bypass security restrictions or conduct another unknown impact. Below is a complete list of vulnerabilities
Technical details Vulnerability №1 caused by a taint property which is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image. Vulnerability №2 caused by mishandling the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter. Vulnerability №3 caused by improper copying data buffers Vulnerability №4 can be exploited via vectors involving a provisional URL for an initially empty document and related to FrameLoader.cpp and ScopedPageLoadDeferrer.cpp Vulnerability №5 caused by Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG |
Пораженные продукты
|
Google Chrome verions earlier than 52.0.2743.116 (All branches) |
Решение
|
Update to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. |
Первичный источник обнаружения
|
Google Chrome releases blog |
Оказываемое влияние
?
|
DoS
[?]
SB
[?]
SUI
[?]
|
Связанные продукты
|
Google Chrome |
CVE-IDS
|
CVE-2016-51467.5Critical
CVE-2016-51456.8High CVE-2016-51447.5Critical CVE-2016-51437.5Critical CVE-2016-51427.5Critical CVE-2016-51415.0Critical CVE-2016-51407.5Critical |
Узнай статистику распространения уязвимостей в твоем регионе |